Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 08:28

General

  • Target

    2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe

  • Size

    36KB

  • MD5

    58515856491edfae4e28dde5fe1294fc

  • SHA1

    29465a1b65ad4bf30ea79d300ee231eec928eb1c

  • SHA256

    51001316e915fd7f0a30663e23caa190807d96367ed0ff89b7e295a8619c08cb

  • SHA512

    8c5df7a767d61f935989f30229f6652fdd98b2bcf572cb0758f10758e0c3d2ce2a63665b7c7fbfa74e32d514aef69c08a915fa3503ee91d6c7049f652d055fb8

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6c3l8Sz960SPluhX:bAvJCYOOvbRPDEgXRc3SSz3SPq

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    36KB

    MD5

    e6a1ec9d61ada9e3034121e9ed2ded6d

    SHA1

    3928efe2e529f01c2800ec597e19a3234e9b1d16

    SHA256

    60742dece17b96022ec5a8e4c8450d28a9094aa6ae639bf0d6b72829e80e8382

    SHA512

    d3c9e9d3ead32ec319cd8d56b87af37228b17435f006f386399272598305fdcb8ad0a4931e1aa2bd2866f62d270d607e0397554a9c55e72a1830f9395baf86bc

  • memory/4496-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4496-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4496-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB